A research agenda for Autonomous Business Process Management. [Citation Graph (, )][DBLP]
Secure Web Application Development and Global Regulation. [Citation Graph (, )][DBLP]
Query Assurance Verification for Dynamic Outsourced XML Databases. [Citation Graph (, )][DBLP]
A Reflection-Based Framework for Content Validation. [Citation Graph (, )][DBLP]
Web Engineering Security: Essential Elements. [Citation Graph (, )][DBLP]
Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology. [Citation Graph (, )][DBLP]
CSP-Based Firewall Rule Set Diagnosis using Security Policies. [Citation Graph (, )][DBLP]
CASSIS - Computer-based Academy for Security and Safety in Information Systems. [Citation Graph (, )][DBLP]
Trust in global computing systems as a limit property emerging from short range random interactions. [Citation Graph (, )][DBLP]
A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam. [Citation Graph (, )][DBLP]
HICI: An Approach for Identifying Trust Elements The case of technological trust perspective in VBEs. [Citation Graph (, )][DBLP]
A Semantic and Time Related Recommendation-Feedback Trust Model. [Citation Graph (, )][DBLP]
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. [Citation Graph (, )][DBLP]
Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. [Citation Graph (, )][DBLP]
A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. [Citation Graph (, )][DBLP]
On the Assessment of the Interaction Quality of Users with Cerebral Palsy. [Citation Graph (, )][DBLP]
Research and Design of Mobile Impeachment System with Semi-cryptonym. [Citation Graph (, )][DBLP]
Efficient Malicious Agreement in a Virtual Subnet Network. [Citation Graph (, )][DBLP]
Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. [Citation Graph (, )][DBLP]
Application of QVT for the Development of Secure Data Warehouses: A case study. [Citation Graph (, )][DBLP]
Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. [Citation Graph (, )][DBLP]
Applying a Flexible Mining Architecture to Intrusion Detection. [Citation Graph (, )][DBLP]
An Application of Learning Problem in Anomaly-based Intrusion Detection Systems. [Citation Graph (, )][DBLP]
Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. [Citation Graph (, )][DBLP]
Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges. [Citation Graph (, )][DBLP]
A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace. [Citation Graph (, )][DBLP]
Reliability Markov Chains for Security Data Transmitter Analysis. [Citation Graph (, )][DBLP]
Requirements and Evaluation Procedures for eVoting. [Citation Graph (, )][DBLP]
Towards Secure E-Elections in Turkey: Requirements and Principles. [Citation Graph (, )][DBLP]
On Coercion-Resistant Electronic Elections with Linear Work. [Citation Graph (, )][DBLP]
A Security Model and Architecture for Multichannel E-Government Systems. [Citation Graph (, )][DBLP]
eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. [Citation Graph (, )][DBLP]
Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies. [Citation Graph (, )][DBLP]
Secure Distributed Dossier Management in the Legal Domain. [Citation Graph (, )][DBLP]
Building a Dependable Messaging Infrastructure for Electronic Government. [Citation Graph (, )][DBLP]
A Universal Construction for Concurrent Objects. [Citation Graph (, )][DBLP]
FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance. [Citation Graph (, )][DBLP]
On the implementation of the Omega failure detector in the crash-recovery failure model. [Citation Graph (, )][DBLP]
Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach. [Citation Graph (, )][DBLP]
Self-Stabilization as a Foundation for Autonomic Computing. [Citation Graph (, )][DBLP]
On Programming Models for Service-Level High Availability. [Citation Graph (, )][DBLP]
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. [Citation Graph (, )][DBLP]
How can the developer benefit from security modeling? [Citation Graph (, )][DBLP]
AProSec: an Aspect for Programming Secure Web Applications. [Citation Graph (, )][DBLP]
Empirical and statistical analysis of risk analysis-driven techniques for threat management. [Citation Graph (, )][DBLP]
Secure Software Development through Coding Conventions and Frameworks. [Citation Graph (, )][DBLP]
Pastures: Towards Usable Security Policy Engineering. [Citation Graph (, )][DBLP]
Security Objectives within a Security Testing Case Study. [Citation Graph (, )][DBLP]
CppTest: A Prototype Tool for Testing C/C++ Programs. [Citation Graph (, )][DBLP]
A Novel Approach to Building Secure Systems. [Citation Graph (, )][DBLP]
Exception Handling in an Event-Driven System. [Citation Graph (, )][DBLP]
Issues in Testing Dependable Event-Based Systems at a Systems Integration Company. [Citation Graph (, )][DBLP]
Optimizing Events Traffic in Event-based Systems by means of Evolutionary Algorithms. [Citation Graph (, )][DBLP]
Event-Based Monitoring of Open Source Software Projects. [Citation Graph (, )][DBLP]
Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System. [Citation Graph (, )][DBLP]
Indexing and Search of Correlated Business Events. [Citation Graph (, )][DBLP]
An Approach for Adaptive Intrusion Prevention Based on The Danger. [Citation Graph (, )][DBLP]
A Human-Verifiable Authentication Protocol Using Visible Laser Light. [Citation Graph (, )][DBLP]
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. [Citation Graph (, )][DBLP]
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. [Citation Graph (, )][DBLP]
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. [Citation Graph (, )][DBLP]
Analysis on Bleichenbacher's Forgery Attack. [Citation Graph (, )][DBLP]
A New Method for Reducing the Revocation Delay in the Attribute Authentication. [Citation Graph (, )][DBLP]
Efficient Multiparty Computation for Comparator Networks. [Citation Graph (, )][DBLP]